In your course (Encor) you went through 3 types of IPSec tunnels, could you please verify if understanding is correct?
It seems like 2 and 3 are more handy hence used more often ?
1.Cisco IPsec Tunnel Mode Configuration:
define cryptomap (ISAKMP, Tranform-set, peer IP addressse of both ends of tunnel, ACL to match traffic to be encrypted )
apply cryptop map to interface of where the IP addresses of tunnel
define ACL to identify the source and destination traffic are to be encrypted
config routes to route traffic through IPSec tunnel
end result: all traffic that matches ACL are encrypted
2.Encrypted GRE Tunnel with IPSEC:
define cryptomap and apply to interfaces where GRE tunnels are built on
built GRE tunnel
define ACL to match all traffic through tunnel (to be encrypted)
end result: all traffic going through GRE is encrypted
Your understanding of the three methods by which IPsec can be applied appears to be correct. I just want to make the following clarification:
The IPsec Tunnel Mode option is a method that is used to encapsulate each IP packet into another IP packet and have it encrypted. Only the traffic matching the ACL will be encrypted. This method allows IPSec itself to create an entrypted tunnel.
The Encrypted GRE Tunnel with IPsec option uses a GRE tunnel, which by itself does not include encryption. In this case, you are applying only the encryption capabilities of IPsec to encrypt the traffic traversing the GRE tunnel.
Finally, the IPsec Static Virtual Tunnel Interface option is most similar to the IPsec Tunnel Mode at least as far as the encryption mechanisms applied. However, it is configured differently, especially as far as how to define traffic that will be encrypted.
Indeed the Encrypted GRE tunnel and IPsec VTIs are typically easier to configure and are more flexible in their application, so you see them used more often. They allow for more dynamic routing and multicast traffic, which is not possible with the tunnel mode configuration.
So you see, IPsec is a technology that can be applied to many different communication methodologies to employ encryption and security. The list above is not exhaustive, you can do a further search to find out more.